Advertisement

  • News
  • Columns
  • Interviews
  • BW Communities
  • Events
  • BW TV
  • Subscribe to Print
BW Businessworld

Survey Reveals 90% Organisations Cannot Detect, Contain & Resolve Cyberthreats Within An Hour

Among these, a majority reported a weak security posture, and believe they need to improve their underlying activities — from gaining visibility into multiple clouds, to applying more consistent governance across accounts, to streamlining incident response and investigation

Photo Credit : shutterstock

1678244638_CCHg7H_cybersecurity.jpg

A survey on Tuesday revealed 90 per cent of organisations surveyed said they cannot detect, contain and resolve cyber threats within an hour.

Among these, a majority reported a weak security posture, and believe they need to improve their underlying activities — from gaining visibility into multiple clouds, to applying more consistent governance across accounts, to streamlining incident response and investigation.

The Palo Alto Networks report said a large majority (78 per cent) of organisations said they have distributed responsibility for cloud security to individual teams, but almost half (47 per cent) said a majority of their workforce does not understand their security responsibilities.

The report revealed that the expansion of hybrid work during the pandemic drove organisations to expand their use of clouds by more than 25 per cent. As a result, DevOps teams are being pressed to deliver production code at warp speed — making application security more complex, and putting pressure on security organizations to keep pace.

“With three out of four organisations deploying new or updated code to production weekly, and almost 40 per cent committing new code daily, no one can afford to overlook the security of cloud workloads,” said Ankur Shah, senior vice president, Prisma Cloud, Palo Alto Networks. “As cloud adoption and expansion continues, organisations need to adopt a platform approach that secures applications from code to cloud across multicloud environments.”


Tags assigned to this article:
Cyberthreats cybersecurity